essential of cyber security Flashcards
(25 cards)
What is cybersecurity?
The practice of protecting systems, networks, and programs from digital attacks.
True or False: Cybersecurity only involves protecting personal information.
False
What does the CIA triad stand for in cybersecurity?
Confidentiality, Integrity, Availability
Fill in the blank: A __________ is a malicious software designed to harm, exploit, or otherwise compromise a computer system.
virus
What is a firewall?
A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Multiple Choice: Which of the following is a common type of cyber attack? A) Phishing B) Gardening C) Cooking D) Painting
A) Phishing
What is the purpose of encryption in cybersecurity?
To convert information or data into a code to prevent unauthorized access.
True or False: Strong passwords are a crucial element of cybersecurity.
True
What does ‘social engineering’ refer to in cybersecurity?
Manipulating individuals into divulging confidential or personal information.
Fill in the blank: A __________ attack involves overwhelming a system with traffic to render it unusable.
Denial-of-Service (DoS)
What is multi-factor authentication?
A security system that requires more than one form of verification to access an account.
Multiple Choice: Which of the following is NOT a type of malware? A) Ransomware B) Spyware C) Firewall D) Worm
C) Firewall
What is the role of an incident response team?
To prepare for, detect, and respond to cybersecurity incidents.
True or False: Regular software updates are important for cybersecurity.
True
What does phishing typically involve?
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity.
Fill in the blank: __________ is a type of malware that encrypts files and demands payment to restore access.
Ransomware
What is an intrusion detection system (IDS)?
A device or software application that monitors a network or systems for malicious activity or policy violations.
Multiple Choice: What does VPN stand for? A) Virtual Private Network B) Very Private Network C) Variable Public Network D) Verified Private Network
A) Virtual Private Network
What is the principle of least privilege?
The practice of limiting access rights for accounts to the bare minimum permissions they need to perform their functions.
True or False: Cybersecurity is only the responsibility of the IT department.
False
What is the purpose of a security policy?
To outline the rules and procedures for maintaining security within an organization.
Fill in the blank: __________ is the process of identifying, assessing, and prioritizing risks followed by coordinated efforts to minimize, monitor, and control the probability of unfortunate events.
Risk management
What is a DDoS attack?
A Distributed Denial-of-Service attack that uses multiple compromised systems to flood a target with traffic.
Multiple Choice: Which of the following is a technique used to protect against data breaches? A) Data Loss Prevention B) Data Expansion C) Data Compression D) Data Duplication
A) Data Loss Prevention